Designing Microsoft windows 2000 network security / Microsoft Corporation.
Series: Academic learning seriesPublication details: Washington : Microsoft press, c2001.Edition: Academic editionDescription: liv, 793 p. : ill. ; 24 cm. + 1 CD-ROM (4 3/4 in.)ISBN:- 0735611343
- 0735612692
- 005.8 22 DES
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 005.8 DES 1 (Browse shelf(Opens below)) | 1 | Available | BUML23112232 | |
Book Open Access | Engineering Library | 005.8 DES 2 (Browse shelf(Opens below)) | 2 | Available | BUML23112265 |
CONTENT
Chapter 1 Introduction to microsoft windows 2000 security
Lesson 1: Microsoft windows 2000 security services overview
Lesson 2: Determining security business requirements
Lesson 3: Designing security to meet technical requirements
Chapter 2 Designing active directory for security
Lesson 1 : Designing your forest structure
Lesson 2: Designing your domain structure
Lesson 3 Designing an OU Structure
Lesson 4 : Designing an audit strategy
Chapter 3 Designing authentication for a microsoft windows 2000 network
Lesson 1: Designing authentication in a microsoft windows 2000 network
Lesson 2; Designing Kerberos authentication
Lesson 3; NTLM Authentication
Lesson 4: Authenticating down level clients
Lesson 5: Planning server placement for authentication
Chapter 4 Planning a Microsoft windows 2000 administrative structure
Lesson 1; Planning administrative group membership
Lesson 2 Securing administrative access to the network
Chapter 5 Designing group security
Lesson 1: Designing Microsoft windows 2000 security groups
Lesson 2 Designing user rights
Chapter 6: Securing file resources
Lesson 1: Securing access to file resources
Lesson 2: Securing access to print resources
Lesson 3: planning EFS security
Chapter 7: Designing group policy
Lesson 1: Planning deployment of group policy
Lesson 2: Troubleshooting group policy
Chapter 8: Securing Microsoft windows 2000-based computers
Lesson 1: Planning Microsoft windows 2000 security templates
Lesson 2: Analyzing security settings to the security template
Lesson 3: Planning the deployment of security by using security templates
Chapter 9: Designing Microsoft windows 2000 services security
Lesson 1: Designing DNS security
Lesson 2: Designing DHCP security
Lesson 3: Designing RIS security
Lesson 4: Designing SNMP security
Lesson 5: Designing terminal services security
Chapter 10: Planning a public key infrastructure
Lesson 1: Planning a certification authority hierarchy
Lesson 2 : Managing certification authorities
Lesson 3: Using certificates for authentication
Chapter 11: Securing data at the application layer
Lesson 1: Planning authenticity and integrity of transmitted data
Lesson 2: Planning encryption of transmitted data
Chapter 12: Securing data with internet protocol security
Lesson 1: Designing IPSec corporation
Lesson 2: Planning IPSec deployment
Chapter 13: Securing access for remote users and networks
Lesson 1: Planning remote access security
Lesson 2: Designing remote access security for users
Lesson 3: Designing remote access security for networks
etc.
Chapter 14: Securing an extranet
Lesson 1: Identifying common firewall strategies
Lesson 2: Securing internet-accessible resources in a DMZ
Lesson 3: Securing data flow through a DMZ
Chapter 15: Securing internet access
Lesson 1: Designing an internet acceptable use policy
Lesson 2: Securing access to the internet by private network users
Lesson 3: Restricting access to content on the internet
etc.
Chapter 16: Securing access in a heterogeneous network environment
Lesson 1: Providing interoperability between windows 2000 and heterogeneous network
Lesson 2: Securing authentication in a heterogeneous network
Lesson 3: Designing directory synchronization and integration
etc.
Chapter 17: Designing a security plan
Lesson 1: Defining a security policy
Lesson 2: Developing a security plan
Lesson 3: Maintaining a security plan
Includes index.
There are no comments on this title.